Methodologies
Penetration testing typically involves four steps: planning and reconnaissance, identifying vulnerabilities, exploiting vulnerabilities and documenting findings
Last updated
Penetration testing typically involves four steps: planning and reconnaissance, identifying vulnerabilities, exploiting vulnerabilities and documenting findings
Last updated
Cyber Sec Rom follows the most known cyber security methodologies, and for each type of assessment these are configured based on clients needs and requirements.
Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software. Through community-led open-source software projects, hundreds of local chapters worldwide, tens of thousands of members, and leading educational and training conferences, the OWASP Foundation is the source for developers and technologists to secure the web.
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
The Open Source Security Testing Methodology Manual is peer-reviewed and maintained by the Institute for Security and Open Methodologies (ISECOM). It has been primarily developed as a security auditing methodology assessing against regulatory and industry requirements.
The Framework provides a common language for understanding, managing, and expressing cybersecurity risk to internal and external stakeholders. It can be used to help identify and prioritise actions for reducing cybersecurity risk, and it is a tool for aligning policy, business, and technological approaches to managing that risk.